1. OpenSSL allows heartbeats during handshake.
2. Handshake request can come from any peer and is responded to (client or 
server is immaterial). You don't prevent it, so a peer can send heartbeat 
request and your openssl endpoint shall respond.

From what you describe, your application is vulnerable.

-Amarendra

--
sent via 100% recycled electrons from my mobile command center.

> On Apr 10, 2014, at 2:02 PM, "mclellan, dave" <dave.mclel...@emc.com> wrote:
> 
> We are looking more deeply into Heartbleed to determine the risk to our 
> proprietary, non-open application.
> 1.       Background summary: Our proprietary client/server protocol is 
> protected by TLS with OpenSSL 1.0.1c and 1.0.1e.   We do not respond to http 
> or any other standard protocols.  The session initiation and RPC-like 
> communication between client and server is encapsulated inside an API library 
> which an application can’t influence directly.  Neither the physical socket 
> nor the SSL object that represents the channel is directly accessible to the 
> caller of the API library.
> 2.       Question: Heartbeat negotiation: Is there anything automatic in TLS 
> session negotiation that causes the heartbeat protocol to be used by peers 
> without application awareness? Our application does nothing explicit to  
> negotiate the Heartbeat Extension; we do nothing to prevent it.   
> 3.       Question: Heartbeat use: once negotiated, is there anything 
> automatic in the protocol that causes one side to request a heartbeat from 
> the peer?   Our peers communicate at the application level in a strict 
> synchronous request – response method; a client thread sends a request and 
> waits for a response; no secondary threads are involved.
>  
> Since we enclose the application client and server applications and we do no 
> heartbeat work ourselves, what is the risk?  We recognize that reverse 
> engineering our protocol is possible, but we believe that the difficulty of 
> the exploit in the context of our server application is very high.  We also 
> recognize that we could be surprised by very clever attackers, so we want to 
> do the right thing.
>  
> +-+-+-+-+-+-+-+-+-
> Dave McLellan, VMAX Software Engineering, EMC Corporation, 176 South St.
> Mail Stop 176-V1 1/P-36, Hopkinton, MA 01749
> Office:    508-249-1257, Mobile:   978-500-2546, dave.mclel...@emc.com
> +-+-+-+-+-+-+-+-+-
>  

Reply via email to